General

  • Target

    c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95

  • Size

    193KB

  • MD5

    adc600e64099e2c1ecb53b82d3286f03

  • SHA1

    a71ada35808bd545d376b02e20c9be31d9cf7c4d

  • SHA256

    c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95

  • SHA512

    4a2718ab29bf98b6e2b176bed78b6e21071f2c9e7bfb6eab249aa68fb1162c9e792ba44f678342a7769a792bec4559666f27925f55659b590b479716958bd388

  • SSDEEP

    3072:BeJPheYi3PAb4thqZoJHLGQN50BmST0LMBbgwIv:EoYifAkKwHLrcBmST0LMBbgwIv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95
    .elf linux x86